Mobile computing -- Security measures
Resource Information
The concept Mobile computing -- Security measures represents the subject, aboutness, idea or notion of resources found in Sydney Jones Library, University of Liverpool.
The Resource
Mobile computing -- Security measures
Resource Information
The concept Mobile computing -- Security measures represents the subject, aboutness, idea or notion of resources found in Sydney Jones Library, University of Liverpool.
- Label
- Mobile computing -- Security measures
51 Items that share the Concept Mobile computing -- Security measures
Context
Context of Mobile computing -- Security measuresSubject of
No resources found
No enriched resources found
- 10 don'ts on our digital devices : the non-techie's survival guide to cyber security and privacy
- AAA and network security for mobile access : radius, diameter, EAP, PKI and IP mobility
- AAA and network security for mobile access : radius, diameter, EAP, PKI and IP mobility
- Android forensics : investigation, analysis, and mobile security for Google Android
- Android forensics : investigation, analysis, and mobile security for Google Android
- Android forensics : investigation, analysis, and mobile security for Google Android
- Android forensics : investigation, analysis, and mobile security for Google Android
- Android malware and analysis
- Android malware and analysis
- Android security : attacks and defenses
- Android security : attacks and defenses
- Android security internals : an in-depth guide to Android's security architecture
- Android security internals : an in-depth guide to android's security architecture
- Application security for the Android platform
- Extending IBM business process manager to the mobile enterprise with IBM worklight
- Five technological forces disrupting security : how cloud, social, mobile, big data and IoT are transforming physical security in the digital age
- Five technological forces disrupting security : how cloud, social, mobile, big data and IoT are transforming physical security in the digital age
- Hacking Android : explore every nook and cranny of the Android OS to modify your device and guard it against security threats
- Hacking exposed : mobile security secrets & solutions
- Hacking exposed : mobile security secrets & solutions
- IBM worklight mobile application development essentials : develop efficient mobile applications using IBM Worklight
- IOS application security : the definitive guide for hackers and developers
- IPhone forensics : recovering evidence, personal data, and corporate assets
- Learning Android forensics : analyze Android devices with the latest forensic tools and techniques
- Mobile Security : a Pocket Guide
- Mobile application security
- Mobile application security
- Mobile data loss : threats and countermeasures
- Mobile device security for dummies
- Mobile malware attacks and defense
- Mobile malware attacks and defense
- Mobile malware attacks and defense
- Mobile security : how to secure, privatize, and recover your devices : keep your data secure on the go
- Mobile security and privacy : advances, challenges and future research directions
- Netzsicherheit : Grundlagen & Protokolle - Mobile & drahtlose Kommunikation - Schutz von Kommunikationsinfrastrukturen
- Practical mobile forensics : a hands-on guide to mastering mobile forensics for the iOS, Android, and Windows Phone platforms
- Practical mobile forensics : a hands-on guide to mastering mobile forensics for the iOS, Android, and Windows Phone platforms
- Practical mobile forensics : a hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms
- Privacy in mobile and pervasive computing
- Pro iOS security and forensics : enterprise iPhone and iPad safety
- Secure development for mobile apps : how to design and code secure mobile applications with PHP and JavaScript
- Secure development for mobile apps : how to design and code secure mobile applications with PHP and JavaScript
- Securing your mobile business with IBM Worklight
- Security with Go : explore the power of Golang to secure host, web, and cloud services
- Software test attacks to break mobile and embedded devices
- Software test attacks to break mobile and embedded devices
- Take control of iOS & iPadOS privacy and security
- Wireless and mobile device security
- Wireless and mobile device security
- iOS application security : the definitive guide for hackers and developers
- iPhone forensics
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/resource/AByMZnHGz7A/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/resource/AByMZnHGz7A/">Mobile computing -- Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">Sydney Jones Library, University of Liverpool</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Mobile computing -- Security measures
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/resource/AByMZnHGz7A/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/resource/AByMZnHGz7A/">Mobile computing -- Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">Sydney Jones Library, University of Liverpool</a></span></span></span></span></div>